Submissions from 2019
MultiPLZW: A novel multiple pattern matching search in LZW-compressed data, Monther Aldwairi, Abdulmughni Y. Hamzah, and Moath Jarrah
Exploring the integration of CDIO, crowdsourcing and gamification into information security courses, Monther Aldwairi and Ahmed Shuhaiber
Students’ acceptance of CDIO as a crowdsourcing and gamification methodology in IT classrooms: A multiple regression model, Monther Aldwairi and Ahmed Shuhaiber
Empirical Investigation of Key Factors for SaaS Architecture Dimension, Saiqa Aleem, Faheem Ahmed, Rabia Batool, and Asad Khattak
Guidelines for key organizational factors for saas organizations, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Khattak
Design guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Masood Khattak
Assessment and hardening of IOT development boards, Omar Alfandi, Musaab Hasan, and Zayed Balbahaith
A comparative analysis of cyberbullying and cyberstalking laws in the UAE, US, UK and Canada, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, and Djedjiga Mouheb
Feminist perspectives on education and pedagogy: A meta-synthetic insight into the thought of four American philosophers, Khadija Alhumaid
Four Ways Technology Has Negatively Changed Education, Khadija Alhumaid
Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm, Hafiz Munsub Ali, Waleed Ejaz, May Al Taei, and Farkhund Iqbal
The effect of culture and organisational culture on administrative corruption, Salem A. Al-Jundi, Ahmed Shuhaiber, and Shaban S. Al-Emara
Effect of consumer innovativeness on new product purchase intentions through learning process and perceived value, Salem A. Al-Jundi, Ahmed Shuhaiber, and Reshmi Augustine
Improving fog computing performance via Fog-2-Fog collaboration, Mohammed Al-khafajiy, Thar Baker, Hilal Al-Libawy, Zakaria Maamar, Moayad Aloqaily, and Yaser Jararweh
Fog computing framework for internet of things applications, Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Atif Waraich, Carl Chalmers, and Omar Alfandi
Enabling high performance fog computing through fog-2-fog coordination model, Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, and Aseel Hussien
Using Data Mining Techniques to Identify Construction Claims Causes: A Case Study, Vasila Al Khaldi, Nazar Zaki, Essam Zaneldin, and Elfadil A. Mohamed
Neuroprotective effects of melatonin and celecoxib against ethanol-induced neurodegeneration: A computational and pharmacological approach, Lina T. Al Kury, Alam Zeb, Zain Ul Abidin, Nadeem Irshad, Imran Malik, Arooj Mohsin Alvi, Atif Ali Khan Khalil, Sareer Ahmad, Muhammad Faheem, Arif Ullah Khan, Fawad Ali Shah, and Shupeng Li
A digital platform for supervised self-directed learning in emergencies: the case of the Syrian crisis, Nada Almasri, Luay Tahat, Sawsan Skaf, and Aman Al Masri
Comparing the behaviour of human face capturing attention of autistic & normal developing children using eye tracking data analysis approach, Mohamed Basel Almourad and Emad Bataineh
Analysis of WCAG 2.0 data accessibility success criterion of e-government websites, Mohamed Basel Al Mourad, Mohammed Hussein, Faouzi Kamoun, and Zelal Wattar
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, Andrew Marrington, and Janet C. Read
Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols, F. Al-Obeidat and E. S.M. El-Alfy
A Sentiment Analysis Approach of Data Volatility for Consumer Satisfaction in the Fashion Industry, Feras Al-Obeidat, Anoud Bani Hani, Elhadj Benkhelifa, Oluwasegun Adedugbe, and Munir Majdalawieh
Combining machine learning and metaheuristics algorithms for classification method PROAFTN, Feras Al-Obeidat, Nabil Belacel, and Bruce Spencer
Constitutional and Legislative Guarantees of Foreign Investment in Light of Jordanian Legislation, Nayel Musa Shaker Alomran
Why some people do not use Facebook?, Anas Aloudat, Ons Al-Shamaileh, and Katina Michael
Analyzing D-wave quantum macro assembler security, Hesham H. Alsaadi, Monther Aldwairi, and Eva Marie Muller-Stuler
Oral health status of athletes with intellectual disabilities: a review, Shahd Omar Al-Shamlan, Mutaz Mohammad, and Dimitrios Papandreou
Big data and wellbeing in the Arab world, Aamna Al-Shehhi, Ian Grey, and Justin Thomas
Cross-Linguistic Twitter Analysis of Discussion Themes before, during and after Ramadan, Aamna Alshehhi, Justin Thomas, Roy Welsch, and Zeyar Aung
Arabia Felix 2.0: a cross-linguistic Twitter analysis of happiness patterns in the United Arab Emirates, Aamna Al Shehhi, Justin Thomas, Roy Welsch, Ian Grey, and Zeyar Aung
Assessment of heavy metals in roadside dust along the Abu Dhabi–Al Ain National Highway, UAE, Ahmed A. Al-Taani, Yousef Nazzal, and Fares M. Howari
Long-term trends in ambient fine particulate matter from 1980 to 2016 in United Arab Emirates, Ahmed A. Al-Taani, Yousef Nazzal, Fares M. Howari, and Ahmad Yousef
Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges, May Altaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, and Huwida Said
From the industrial revolution to globalisation and integrative labour markets, Tareq Al-Tawil, Muath M. Eleswed, and Walaaeldeen Ibraheem
Piercing the corporate veil: when LLCs and corporations may be at risk, Tareq Na’el Al-Tawil
A Deep Learning Approach for Amazon EC2 Spot Price Prediction, Hana Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad Alsmirat, and Monther Aldwair
Spatializing higher education: Emirati women learners’ hot and cold spaces, Gergana Alzeer
Customer churn prediction in telecommunication industry using data certainty, Adnan Amin, Feras Al-Obeidat, Babar Shah, Awais Adnan, Jonathan Loo, and Sajid Anwar
Features weight estimation using a genetic algorithm for customer churn prediction in the telecom sector, Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, and Fernando Moreira
Cross-company customer churn prediction in telecommunication: A comparison of data transformation methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, and Sajid Anwar
Android malware detection through generative adversarial networks, Muhammad Amin, Babar Shah, Aizaz Sharif, Tamleek Ali, Ki l.L. Kim, and Sajid Anwar
Tennis serve data may elude some as serves get too fast, Nejat Anbarci, K. Peren Arin, and Christina Zenker
Mitigation of ground vibrations by circular arrays of rigid blocks, Lars V. Andersen, Andrew T. Peplow, and Peter Persson
BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks, Raja Waseem Anwar, Anazida Zainal, Fatma Outay, Ansar Yasar, and Saleem Iqbal
A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing, Mohamad Arafeh, May El Barachi, Azzam Mourad, and Fatna Belqasmi
A comparison between google cloud service and icloud, Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, and Mohammed Ghazal
Negotiating with Terrorists: The Costs of Compliance, Kerim Peren Arin, Eberhard Feess, Torben Kuhlenkasper, and Otto F.M. Reich
Revisiting the Growth Effects of Fiscal Policy: A Bayesian Model Averaging Approach, K. Peren Arin, Elias Braunfels, and Gernot Doppelhofer
Sleep Routines in Children, Teresa Arora
Sleep, obesity and cardiometabolic disease in children and adolescents, Teresa Arora and Ian Grey
Materialism in the United Arab Emirates: A grounded model of materialism in an emerging market, Damien Arthur, Claire Eloise Sherman, Noora Saeed Al Hameli, and Salama Yousef Al Marzooqi
Exploring deep neural networks for rumor detection, Muhammad Zubair Asghar, Ammara Habib, Anam Habib, Adil Khan, Rehman Ali, and Asad Khattak
Role of outer membrane permeability, efflux mechanism, and carbapenemases in carbapenem-nonsusceptible Pseudomonas aeruginosa from Dubai hospitals: Results of the first cross-sectional survey, Carole Ayoub Moubareck, Dalal Hammoudi Halat, Charbel Akkawi, Anju Nabi, Mouza A. AlSharhan, Zulfa O. AlDeesi, Christabel C. Peters, Handan Celiloglu, and Dolla Karam Sarkis
A critical snapshot of the practice of public relations in the United Arab Emirates, Badran A. Badran
Online authentication methods used in banks and attacks against these methods, Anoud Bani-Hani, Munir Majdalweieh, and Aisha AlShamsi
A relational approach to exploring inequalities within the human resource management model in the Middle East, Safiya Banu, Nicolina Kamenou-Aigbekaen, and Laura Galloway
A Novel Quality and Reliability-Based Approach for Participants' Selection in Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, and Kiyan Afsari
Designing the Lebanese public education budget: A policy document analysis, Sandra Baroudi
Behind the scenes: teachers’ perspectives on factors affecting the implementation of inquiry-based science instruction, Sandra Baroudi and Marlieke Rodjan Helder
Non-Orthogonal Radio Resource Management for RF Energy Harvested 5G Networks, Mehak Basharat, Muhammad Naeem, Waleed Ejaz, Asad Masood Khattak, Alagan Anpalagan, Omar Alfandi, and Hyung Seok Kim
Fog computing enabling industrial internet of things: State-of-the-art and research challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, and Mikael Gidlund
Towards a new generation of web browsers: An eyettracking study, Emad Bataineh and Bilal Bataineh
Domain Adaptation for Car Accident Detection in Videos, Elizaveta Batanina, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Adil Khan, Asad Masood Khattak, and Mikhail Bortnikov
Tracing the evolution of advertising account planning, Park Beede
Triplet loss network for unsupervised domain adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, and Asad Masood Khattak
Privacy-preserving data analysis workflows for eScience, Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi
Virtual Environments Testing as a Cloud Service: A Methodology for Protecting and Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, and Chirine Ghedira Guegan
Dependence measure for length-biased survival data using copulas, Rachid Bentoumi, Mhamed Mesfioui, and Mayer Alvo
Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector, Nacer Eddine Benzebouchi, Nabiha Azizi, Nacer Eddine Hammami, Didier Schwab, Mohammed Chiheb Eddine Khelaifia, and Monther Aldwairi
Construct heterogeneity and proliferation in advertising research, Lars Bergkvist and Tobias Langner
Cause-related marketing persuasion research: an integrated framework and directions for further research, Lars Bergkvist and Kris Qiang Zhou
Incentive Based Relaying in D2D Social Networks, Jagadeesha R. Bhat, C. V. Anoop, and Omar Alfandi
Dimorphic fruit colour is associated with differences in germination of calligonum comosum, Arvind Bhatt, N. R. Bhat, María Mercedes Carón, and David Gallacher
An investigation of the effect of customer beliefs on the intention to participate in family Takaful schemes, Tariq Bhatti and Maizaitulaidawati Md Husin
Rising rural body-mass index is the main driver of the global obesity epidemic in adults, Honor Bixby, James Bentham, Bin Zhou, Mariachiara Di Cesare, Christopher J. Paciorek, James E. Bennett, Cristina Taddei, Gretchen A. Stevens, Andrea Rodriguez-Martinez, Rodrigo M. Carrillo-Larco, Young Ho Khang, Maroje Sorić, Edward W. Gregg, J. Jaime Miranda, Zulfiqar A. Bhutta, Stefan Savin, Marisa K. Sophiea, Maria L.C. Iurilli, Bethlehem D. Solomon, Melanie J. Cowan, Leanne M. Riley, Goodarz Danaei, Pascal Bovet, Adela Chirita-Emandi, Ian R. Hambleton, Alison J. Hayes, Nayu Ikeda, Andre P. Kengne, Avula Laxmaiah, and Yanping Li
Bioprospecting desert plant Bacillus endophytic strains for their potential to enhance plant stress tolerance, Ameerah Bokhari, Magbubah Essack, Feras F. Lafi, Cristina Andres-Barrao, Rewaa Jalal, Soha Alamoudi, Rozaimi Razali, Hanin Alzubaidy, Kausar H. Shah, Shahid Siddique, Vladimir B. Bajic, Heribert Hirt, and Maged M. Saad
Time efficient segmented technique for dynamic programming based algorithms with FPGA implementation, Talal Bonny, Ridhwan Al Debsi, and Mohamed Basel Almourad
Inventor Chief Executive Officers and Firm Innovation, Ibrahim Bostan and G. Mujtaba Mian
Testbed of QoS Ad-Hoc network designed for cooperative multi-drone tasks, Ouns Bouachir, Moayad Aloqaily, Fabien Garcia, Nicolas Larrieu, and Thierry Gayraud
Personalized social query expansion using social annotations, Mohamed Reda Bouadjenek, Hakim Hacid, and Mokrane Bouzeghoub
Corrigendum to Norm-based and commitment-driven agentification of the Internet of Things [Internet of Things volume 6 (2019) 100042], Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy
Debt covenant violation, competition and cost of new debt, Umar Butt
Profits, financial leverage and corporate governance, Umar Butt
A positive Living-in-History effect: the case of the fall of the Berlin Wall, Christin Camia, Christina Menzel, and Annette Bohn
Predictors of life satisfaction in a large representative sample from Italy, Vincenza Capone, Mohsen Joshanloo, and Heinz Scheifinger
Integrated database system with spatial information for disaster risk management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, and Ki Il Kim
Improved Identity Management with Verifiable Credentials and FIDO, David W. Chadwick, Romain Laborde, Arnaud Oglaza, Remi Venant, Samer Wazan, and Manreet Nijjar
Digital addiction: Negative life experiences and potential for technology-assisted solutions, Sainabou Cham, Abdullah Algashami, Manal Aldhayan, John McAlaney, Keith Phalp, Mohamed Basel Almourad, and Raian Ali
Aggregate investor sentiment and stock return synchronicity, Timothy K. Chue, Ferdinand A. Gul, and G. Mujtaba Mian
An Active Noise Correction Graph Embedding Method Based on Active Learning for Graph Noisy Data, Zhiyuan Cui, Donghai Guan, Cong Li, Weiwei Guan, and Asad Masood Khattak
Effective Evaluation of the Non-Technical Skills in the Computing Discipline, Maurice Danaher, Kevin Schoepp, and Ashley Ater Kranov
Teaching and measuring the professional skills of information technology students using a learning oriented assessment task, Maurice Danaher, Kevin Schoepp, and Ashley Ater Kranov
Reliability and validity of the computing professional skills assessment, Maurice Danaher, Kevin Schoepp, and Anthony Rhodes
Student proficiency profiles through the computing professional skills assessment, Maurice Danaher, Kevin Schoepp, Anthony Rhodes, and Tiffany Cammidge
Dynamic Neural Network for Business and Market Analysis, Javier de Arquer Rilo, Abir Hussain, May Al-Taei, Thar Baker, and Dhiya Al-Jumeily
When Employees Retaliate Against Self-Serving Leaders: The Influence of the Ethical Climate, Stijn Decoster, Jeroen Stouten, and Thomas M. Tripp
An authentic-based privacy preservation protocol for smart e-healthcare systems in iot, B. D. Deebak, Fadi Al-Turjman, Moayad Aloqaily, and Omar Alfandi
Deep Learning Based Method for Computer Aided Diagnosis of Diabetic Retinopathy, Omar Dekhil, Ahmed Naglah, Mohamed Shaban, Mohammed Ghazal, Fatma Taher, and Ayman Elbaz